Using Autopsy for Digital Forensic Analysis on the Acorn
Application Type: GUI-based Digital Forensics Platform
Primary Use: Analysing forensic disk images, recovering artefacts, and reconstructing user activity
Pre-installed in the Forensics Hub
Overview
Autopsy, running on the Acorn forensic workstation, provides digital forensic examiners with a reliable and intuitive interface for analysing forensic disk images. Together, they support efficient user activity reconstruction, recovery of deleted files, and detection of data exfiltration. This use case illustrates how an examiner uses Autopsy to investigate a suspected insider breach using a standard .E01 forensic image.
Case Context
A corporate security team suspects that a departing employee has removed confidential financial documents from their laptop. A forensic examiner is tasked with investigating the case. The Acorn’s integrated toolkit is used to acquire an .E01 image of the system using Guymager, and then load it directly into Autopsy for analysis.
2. Loading the E01 Forensic Image
The .E01 image of the employee’s system is selected as the data source. Autopsy automatically chains the segmented files (e.g., .E01 and .E02) and begins parsing the file system.
Screenshot: Evidence image loading screen showing .E01 image path and segment detection
Screenshot: Module selection screen with Keyword Search, File Type ID, and Embedded Extractor enabled
3. Conducting Keyword and File Searches
Using Autopsy’s keyword search module, the examiner loads custom keyword lists relevant to the company’s confidential documents and personnel. With the “Add text to Solr Index” option enabled, the examiner ensures the .E01 image content is indexed directly. Filters are used to narrow results to sensitive file types (e.g., .xlsx, .pdf, .docx) and detect deleted or recently accessed documents.
Screenshot: Keyword search results from .E01 image showing matches on terms like “confidential” and company emails.
Recovered files are tagged and exported for deeper examination
4. Timeline Analysis of File Activity
Autopsy’s timeline module is used to visualise when key files were created, modified, accessed, or deleted. The examiner identifies spikes in file activity near the employee’s resignation date, suggesting periods of intensified document handling and potential data movement.
Screenshot: Timeline showing increased access to sensitive files
5. Artefact Analysis and Sensitive Data Exposure
By analysing system artefacts, the examiner identified evidence of sensitive data exposure. Autopsy revealed traces of credit card information, suggesting personal or corporate data may have been stored insecurely or transferred.
Additionally, keyword searches uncovered multiple email addresses, contact information, and potential account credentials scattered across user files and browser cache.
This analysis supports the hypothesis of data exfiltration through cloud services or webmail, even without direct USB transfer evidence.
Screenshot: Communication artefacts showing recovered credit card identifiers and email addresses
6. Web and Email Activity
Browser artefacts indicate that the employee accessed cloud storage and webmail platforms. Web history and cached content confirm documents were uploaded or emailed externally.
Screenshot: Browser history showing logins to Gmail and Google Drive
Screenshot: Email analysis indicating attachments sent via webmail
7. Reporting and Documentation
The examiner uses WPS Writer on the Acorn to compile a detailed report. Key sections include:
• Lists of keyword hits and matched files
• USB activity logs
• Webmail and cloud service use
• Screenshots from Autopsy for visual evidence
Why Autopsy + The Acorn Works
| Feature | Benefit |
|---|---|
| All-in-One Workflow | Imaging, analysis, and reporting are completed on a single forensic workstation. |
| Native E01 Support | No need for conversion—Autopsy reads split .E01 images directly. |
| Lightweight + Portable | Ideal for field investigators or small teams. |
| Open Source Integration | Autopsy works alongside other pre-installed tools like Guymager, GParted, and ddrescue. |
Learn more about Autopsy